QUESTION 266 Drag and Drop Question A company has 10 Windows 8.1 client computers. You purchase a Windows Store app and install theapp on several computers. The hard drive of a computer on which the application is installed fails. You reinstall Windows 8.1. You need to reinstall the Windows Store app on the computer. Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)

Answer:

QUESTION 267 You are troubleshooting a computer that runs Windows 8.1. A third-party application no longer functions correctly. You need to repair the application. What should you do?

A. Run the reset /f command and specify the application’s .msi file. B. Run the msiexec /f command and specify the application’s .msi file. C. Use File History to revert the application’s .msifile to a previous version. D. Run the replace command, specify the application’s .msi file as the source, and then specify the application’s original installation directory as the destination.

QUESTION 268 You are a desktop administrator for your organization. Your organization has Windows 7 computers and wants to move to a Windows 8.1 solution. The organization purchases the licenses. You need to migrate from Windows 7 to Windows 8.1 while ensuring that programs, settings, and files migrate as well. What should you do?

A. Choose the Change the product key. B. Choose a clean install and use Windows Easy Transfer. C. Choose an upgrade after running setup.exe from the Windows 8 disk. D. Choose a clean install from the Media boot without formatting.

QUESTION 269 You are a desktop administrator for your organization. You have a small group of Windows 8.1 computers you want to upgrade to Windows 8.1 Pro. You need to ensure that these computers have Windows 8.1 Pro installed on them. You receive product keys from your contracting team. What should you do next?

A. Put in a Windows 8 DVD. Your current product key will be recognized, and then you can install Windows Pro. B. Select Run >Regedit> HKLM > License. Then overwrite the dword license file. C. Under Control Panel, select "Add features to Windows 8", and choose "Add product key". D. Under settings, add roles > Windows 8 Pro. Then input the license file.

In the Add features to Windows 8.1 window click I already have a product key (assuming, of course, you have one; if not, purchase one).

Enter your product key and wait for a second. If it’s correct, you will see a message saying "Your key works. Continue when you’re ready". If it’s not correct, you’ll see a message saying "This key won’t work. Check it and try again, or try a different key". Accept the license terms and click Add features. The progress bar should move around for a few moments. Check to see that you have the right edition by looking at the computer properties.

Done.

QUESTION 270 You are a system administrator for your company. The company has satellite offices located within different regions around the world and does not want employees to rely on carrying computers around when they visit the satellite offices. The company is deploying Windows To Go as a solution. You need to ensure that the company has the proper configuration for Windows To Go before deploying the solution. Which configuration should you use?

A. a Windows To Go server that provides the use of a network boot and can provide files to run the operating system B. at least one USB 2.0 port on the host PC C. a second partition to run Windows To Go with a minimum of a DVD-RW to write Windows To Go data D. a 20GB or greater SSD used as a secondary drive

Answer: B Explanation: http://technet.microsoft.com/en-us/windows/jj874386.aspxhttp://technet.microsoft.com/en-us/windows/jj874386.aspxUsing Windows To Go Windows To Go is not a late-night drive-through offering at the local Microsoft Store. Rather, it’s a feature in the Windows 8 Enterprise operating system that allows you to start a Windows 8 image (a Windows To Go workspace) from an external USB drive. You can start a Windows To Go workspace on most computers that meet the Windows 7 or Windows 8 certification requirements, regardless of the operating system currently running on them.

QUESTION 271 Hotspot Question You are a system administrator for Fabrikam, Inc. You are upgrading an end user’s computer to Windows 8.1. You need to evaluate the system’s readiness for the upgrade. The computer properties are displayed in the graphic below:

Use the drop-down menus to select the answer choice that completes each statement. Each correct selection is worth one point.

Answer:

QUESTION 272 You are a domain administrator for your company. Since the company’s Windows 8.1 desktop computers are not backed up regularly, the company wants to enable folder redirection in order to move data from local desktops to network storage. You need to configure folder redirection on the domain so all existing desktops and any new desktops automatically apply the folder redirection settings. What should you do?

A. Create a new Group Policy Object (GPO) and configure the folder redirection options to meet your company’s requirements. B. In computer management, create a task that is labeled Folder Redirection. Allow Folder Redirection to the specified path at named intervals. C. Map a network drive from each local desktop, right-click Properties, and choose Folder Redirection with proper settings. D. Sync your offline folder to the network location to ensure that backups are completed on the network.

Answer: A Explanation: http://msdn.microsoft.com/en-us/library/cc786749(v=ws.10).aspxUser settings and user files are typically stored in the local user profile, under the Users folder. The files in local user profiles can be accessed only from the current computer, which makes it difficult for users who use more than one computer to work with their data and synchronize settings between multiple computers. Two technologies exist to address this problem: Roaming Profiles and Folder Redirection. Both technologies have their advantages, and they can be used separately or together to create a seamless user experience from one computer to another. They also provide additional options for administrators managing user data. Redirection lets administrators redirect the path of a folder to a new location. The location can be a folder on the local computer or a directory on a network file share. Users can work with documents on a server as if the documents were based on a local drive. The documents in the folder are available to the user from any computer on the network. Folder Redirection is located under Windows Settings in the console tree when you edit domain- based Group Policy by using the Group Policy Management Console (GPMC). The path is [Group Policy Object Name]\User Configuration\Policies\Windows Settings\Folder Redirection

QUESTION 273 Hotspot Question You administer Windows 8.1 Pro computers in your company network, including a computer named Wst1. Wst1 is configured with multiple shared printer queues. Wst1 indicates hardware errors. You decide to migrate the printer queues from Wst1 to a new computer named Client1. You export the printers on Wst1 to a file. You need to import printers from the file to Client1. From the Print Management console, which Print Management node should you select? (To answer, select the appropriate node in the answer area.)

Answer:

QUESTION 274 A company has Windows 8.1 client computers. One computer named Computer1 will be used to centralize event logs from other client computers. You need to configure Computer1 to collect events from other client computers, What should you do?

A. Run the New-EventLogcmdlet. B. Create a source-computer-initiated subscription. C. Run the Get-EventLogcmdlet. D. Create a collector-initiated subscription.

Answer: D Explanation: http://msdn.microsoft.com/en-us/library/windows/desktop/bb513652%28v=vs.85%29.aspx Creating a Collector Initiated Subscription You can subscribe to receive events on a local computer (the event collector) that are forwarded from remote computers (the event sources) by using a collector-initiated subscription. In a collector-initiated subscription, the subscription must contain a list of all the event sources. Before a collector computer can subscribe to events and a remote event source can forward events, both computers must be configured for event collecting and forwarding. Further Information: http://msdn.microsoft.com/en-us/library/windows/desktop/bb870973%28v=vs.85%29.aspxSetting up a Source Initiated Subscription Source-initiated subscriptions allow you to define a subscription on an event collector computer without defining the event source computers, and then multiple remote event source computers can be set up (using a group policy setting) to forward events to the event collector computer. This differs from a collector initiated subscription because in the collector initiated subscription model, the event collector must define all the event sources in the event subscription. http://technet.microsoft.com/en-us/library/hh849768.aspx New-EventLog This cmdlet creates a new classic event log on a local or remote computer. It can also register an event source that writes to the new log or to an existing log. The cmdlets that contain the EventLog noun (the Event log cmdlets) work only on classic event logs. To get events from logs that use the Windows Event Log technology in Windows Vista and later versions of Windows, use Get-WinEvent. http://technet.microsoft.com/en-us/library/hh849834.aspx Get-EventLog The Get-EventLog cmdlet gets events and event logs on the local and remote computers. Use the parameters of Get-EventLog to search for events by using their property values. Get-EventLog gets only the events that match all of the specified property values. The cmdlets that contain the EventLog noun (the EventLog cmdlets) work only on classic event logs. To get events from logs that use the Windows Event Log technology in Windows Vista and later versions of Windows, use Get-WinEvent.

QUESTION 275 A company has Windows 8.1 client computers. One computer named Computer1 will be used to centralize event logs from other client computers. You configure a Group Policy Object (GPO) that pushes event logs to Computer1. You need to configure Computer1 to receive the event logs. What should you do?

A. Create a collector-initiated subscription. B. Run the New-EventLogcmdlet. C. Run the Get-EventLogcmdlet. D. Create a source-computer-initiated subscription.

Answer: D Explanation: http://msdn.microsoft.com/en-us/library/windows/desktop/bb870973%28v=vs.85%29.aspxSetting up a Source Initiated Subscription Source-initiated subscriptions allow you to define a subscription on an event collector computer without defining the event source computers, and then multiple remote event source computers can be set up (using a group policy setting) to forward events to the event collector computer. This differs from a collector initiated subscription because in the collector initiated subscription model, the event collector must define all the event sources in the event subscription.

QUESTION 276 A company has client computers that run Windows 8.1. The company implements the following security requirements: – All client computers must use two-factor authentication. – At least one authentication method must include more than four characters or gestures. You need to choose authentication methods that comply with the security requirements. Which two authentication methods should you choose? (Each correct answer presents part of the solution. Choose two.)

Answer: BD Explanation: More than 4 characters are of course supported with the Microsoft Account. It is something the user knows. The picture password would be another thing the user knows (gestures). So there’s only MS Account and Biometric authentication left. Two-factor authentication requires the use of two of the three authentication factors: Something the user knows (e.g., password, PIN); Something the user has (physical Object) (e.g., ATM card, smart card); and Something the user is (e.g., biometric characteristic, such as a fingerprint). The factors are identified in the standards and regulations for access to U.S. Federal Government systems.